background image

Update Guide 

 

Cybersecurity Recommendations 

Appendix 1

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps 
toward protecting and strengthening networks and networked appliances will make them less 
susceptible to attacks. Below are some tips and recommendations on how to create a more secured 
security system. 

Mandatory actions to be taken for basic device network security: 

1.

 

Use Strong Passwords 

Please refer to the following suggestions to set passwords: 

 

The length should not be less than 8 characters; 

 

Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 

 

Do not contain the account name or the account name in reverse order; 

 

Do not use continuous characters, such as 123, abc, etc.; 

 

Do not use overlapped characters, such as 111, aaa, etc.; 

2.

 

Update Firmware and Client Software in Time 

 

According to the standard procedure in Tech-industry, we recommend to keep your device 
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped 
with the latest security patches and fixes. When the device is connected to the public 
network, it is recommended to enable the “auto-check for updates” function to obtain 
timely information of firmware updates released by the manufacturer. 

 

We suggest that you download and use the latest version of client software. 

"Nice to have" recommendations to improve your device network security: 

1.

 

Physical Protection 

We  suggest that you perform physical protection to device, especially storage devices. For 
example, place the device in a special computer room and cabinet, and implement well-done 
access control permission and key management to prevent unauthorized personnel  from 
carrying out physical contacts such as damaging hardware, unauthorized connection of 
removable device (such as USB flash disk, serial port), etc. 

2.

 

Change Passwords Regularly 

We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 

3.

 

Set and Update Passwords Reset Information Timely   

The device supports password reset function. Please set up related information for password 
reset in time, including the end user’s mailbox and password protection questions. If the 
information changes, please modify it in time. When setting password protection questions, it is 
suggested not to use those that can be easily guessed. 

4.

 

Enable Account Lock 

The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 

5.

 

Change Default HTTP and Other Service Ports 

We suggest you to change default HTTP and other service ports into any set of numbers 

Summary of Contents for DSS4004-S2

Page 1: ...I DSS4004 S2 DSS7016D DR S2 Update Guide V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD ...

Page 2: ...ious injury WARNING Indicates a medium or low potential hazard which if not avoided could result in slight or moderate injury CAUTION Indicates a potential risk which if not avoided could result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis and supplement...

Page 3: ...ide II Table of Contents Foreword I 1 Updating from V1 001 to V8 0 2 3 Compatible Version 3 1 1 Upgrade Instructions 3 1 2 Upgrade Methods 3 1 3 Update Operations 4 1 4 Cybersecurity Recommendations 7 Appendix 1 ...

Page 4: ... the following xlsx file for the situations before and after update Update Note xlsx Update Methods 1 3 Non applicable versions cannot be directly upgraded to V8 000 0000002 0 You need to upgrade to the applicable versions first see 1 1 Applicable Version and then to V8 000 0000002 0 If you upgrade to V8 000 0000002 0 directly the system prompts an update failure The data will not be replaced and ...

Page 5: ...re and data corruption Step 1 Open browser enter IP config on the address bar and then press Enter key Step 2 Enter the username and password and then click Login to log in to the web configuration Step 3 interface Select System Maintenance System Update Step 4 You can update on the web interface or by the configuration tool Update on the web interface Click select the update package in BIN format...

Page 6: ... 1 Click Download Config Tool 2 Enter IP address username and password of the web interface and then click Login to log in to the configuration tool 3 Click System Upgrade click Open select the update package in BIN format and then click Upgrade ...

Page 7: ...ptional Select System Maintenance Basic Maintenance Restore Default Step 6 After update if the environment is abnormal and there is no need to archive old data on site you can perform the step which will restore the device to factory settings and delete the old version files After the update is complete download the V8 version of the client Step 7 ...

Page 8: ...mation of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For example place the device in a special computer room and cabinet and implement well done a...

Page 9: ...ed transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in without authorization Check device log By viewing the logs you can know the IP addresses that were...

Page 10: ...Update Guide 9 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device ...

Page 11: ...Update Guide 10 ...

Reviews: